To search, Click below search items.
All Published Papers Search Service
Title
A Lossless Watermarking Scheme for Halftone Image Authentication
Author
Jeng-Shyang Pan, Hao Luo, Zhe-Ming Lu
Vol. 6 No. 2 pp. 147~151
Keywords
Halftone image, Lossless watermarking, Hash sequence, Image authentication
Methodology of Secure and Efficient Source Authentication Protocol for Multicast Data Streams
Sanghoon Jeon, Jeonghoon Jeon, Moonseog Jun
Vol. 6 No. 2 pp. 226~232
Multicast, Source Authentication, Streaming Data security.
Authentication Transmission Overhead Between Entities in Mobile Networks
Ja¡¯afer AL-Saraireh, Sufian Yousef
Vol. 6 No. 3 pp. 150-154
AuC, Authentication, UMTS, Authentication Vector.
A Simple Attack on a Recently Introduced Hash-Based Secure User Authentication Scheme
Minho Kim, ?etin Kaya Ko?
Vol. 6 No. 5 pp. 157-160
Hash function, user authentication, stolen-verifier attack, denial-of-service attack